Internet Surveillance Gear & Process Manuals
EmoPulse – digital emotion; a smart watch
Martijn Groote; How the NSA cheated cryptography; In Some Blog entitled Lapsed Ordinary; 2013-09-23.
Ken Belson; Hits to the Head Don’t Differ With Age, Research Indicates; In The New York Times (NYT); 2013-09-24.
Randall Rothenberg (IAB); The Definition of Advertising Has Never Been More Unclear; In Adweek; 2013-09-16.
Richard Gabriel; Worse is Better; WHEN?
Hans-J. Boehm (HP); Can Seqlocks Get Along With Programming Language Memory Models?; Technical Report HPL-2012-68, Hewlett-Packard; 2012-06-06; ; In Proceedings of ACM SIGPLAN Workshop on Memory Systems Performance and Correctness (MSPC 2012); 9 pages.
Seqlocks are an important synchronization mechanism and represent a significant improvement over conventional reader-writer locks in some contexts. They avoid the need to update a synchronization variable during a reader critical section, and hence improve performance by avoiding cache coherence misses on the lock object itself. Unfortunately, they rely on speculative racing loads inside the critical section. This makes them an interesting problem case for programming-language-level memory models that emphasize data-race-free programming. We analyze a variety of implementation alternatives within the C++11 memory model, and briefly address the corresponding issue in Java. In the process, we observe that there may be a use for “read-dont-modify- write” operations, i.e. read-modify-write operations that atomically write back the original value, without modifying it, solely for the memory model consequences, and that it may be useful for compilers to optimize such operations.
8 Critical Elements of Successful Native Advertising; In Ad Rants; 2013.
Mike Szczys; Hidden RFID reader locks workstation unless keys are present; In Hack a Day; 2013-09-07.
Original: Kristoffer Marshall; Stealth RFID Screensaver Auto Lock/Unlock; In Some Blog; 2013-09-05.
Duncan Campbell; How NSA access was built into Windows; In Heise News; 1999-04-09,
Teaser: Careless mistake reveals subversion of Windows by NSA.
<quote>Had the next-generation CPU’s with encrypted instruction sets already been deployed, we would have never found out about NSAKEY.” </quote> attributed to “one [leading] US cryptographer”